Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe
Resource
win10v2004-20220812-en
General
-
Target
eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe
-
Size
246KB
-
MD5
66a37d7b13902048a7b947785c990910
-
SHA1
c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
-
SHA256
eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
-
SHA512
759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30
-
SSDEEP
6144:jfMrmQ0hVh5kIr06t5J2wiAksaDlRCDeu3OmDv5r9S4vPMHie3Fg1SAuK1:gqr0IJJzdahRCau3lvd3MzWG
Malware Config
Extracted
njrat
0.7d
ابو فرنقع
xk03.no-ip.biz:5552
c294eacc4eeb89346402ee701c9e81b9
-
reg_key
c294eacc4eeb89346402ee701c9e81b9
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1972 bb.exe 472 bb.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 932 netsh.exe -
Loads dropped DLL 2 IoCs
pid Process 1064 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 1972 bb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\c294eacc4eeb89346402ee701c9e81b9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\bb.exe\" .." bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\c294eacc4eeb89346402ee701c9e81b9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\bb.exe\" .." bb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1624 set thread context of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1972 set thread context of 472 1972 bb.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe Token: SeDebugPrivilege 1972 bb.exe Token: SeDebugPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe Token: 33 472 bb.exe Token: SeIncBasePriorityPrivilege 472 bb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1624 wrote to memory of 1064 1624 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 28 PID 1064 wrote to memory of 1972 1064 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 29 PID 1064 wrote to memory of 1972 1064 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 29 PID 1064 wrote to memory of 1972 1064 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 29 PID 1064 wrote to memory of 1972 1064 eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe 29 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 1972 wrote to memory of 472 1972 bb.exe 30 PID 472 wrote to memory of 932 472 bb.exe 31 PID 472 wrote to memory of 932 472 bb.exe 31 PID 472 wrote to memory of 932 472 bb.exe 31 PID 472 wrote to memory of 932 472 bb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe"C:\Users\Admin\AppData\Local\Temp\eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exeC:\Users\Admin\AppData\Local\Temp\eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\bb.exe"C:\Users\Admin\AppData\Local\Temp\bb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\bb.exeC:\Users\Admin\AppData\Local\Temp\bb.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\bb.exe" "bb.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:932
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD566a37d7b13902048a7b947785c990910
SHA1c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
SHA256eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
SHA512759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30
-
Filesize
246KB
MD566a37d7b13902048a7b947785c990910
SHA1c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
SHA256eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
SHA512759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30
-
Filesize
246KB
MD566a37d7b13902048a7b947785c990910
SHA1c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
SHA256eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
SHA512759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30
-
Filesize
246KB
MD566a37d7b13902048a7b947785c990910
SHA1c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
SHA256eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
SHA512759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30
-
Filesize
246KB
MD566a37d7b13902048a7b947785c990910
SHA1c845c1c9ba6e5d07404600e2e2f1b674f5e9e485
SHA256eb34997850c70a4d8e8a9eb0fee3e04b6bdc7aec72cdf6df0f3d63842d736a96
SHA512759b9a3ca40fd89140285dbc32b25b56d9ffa1c64adbf240e5b175dc0e9b0c26ff4ff6bffe397c31e8cefa38c0cc93b2c818ee2a23898dad5a8dba52baeaab30